Analysis
-
max time kernel
159s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 05:11
Behavioral task
behavioral1
Sample
c03071a592d56cf15bb1187cc314be6dad4fb76d3bcffd00a6c256efd38b2641.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c03071a592d56cf15bb1187cc314be6dad4fb76d3bcffd00a6c256efd38b2641.exe
Resource
win10v2004-20221111-en
General
-
Target
c03071a592d56cf15bb1187cc314be6dad4fb76d3bcffd00a6c256efd38b2641.exe
-
Size
120KB
-
MD5
7edc29edf0a669316d12400af609dd9b
-
SHA1
1dede1f95d890fc2227f80fa6975c1fcced834f4
-
SHA256
c03071a592d56cf15bb1187cc314be6dad4fb76d3bcffd00a6c256efd38b2641
-
SHA512
cdc8030cbb9b2fca45de4fd76350e7e007e1bd827809bcc28261678ae85e353b8deef60a39ca05b989d6ac395935d0cfc5ddda6c5cb33fea4c048f72a7de76fb
-
SSDEEP
1536:nk1E+9JWdkgXCKw1NoDb6oBWBP+3QLrYdFDVzKJM2Ndj3KXqhRxP:nk1dJ8JXG1W00aJBvjnbV
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1648-132-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation c03071a592d56cf15bb1187cc314be6dad4fb76d3bcffd00a6c256efd38b2641.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1648 wrote to memory of 628 1648 c03071a592d56cf15bb1187cc314be6dad4fb76d3bcffd00a6c256efd38b2641.exe 82 PID 1648 wrote to memory of 628 1648 c03071a592d56cf15bb1187cc314be6dad4fb76d3bcffd00a6c256efd38b2641.exe 82 PID 1648 wrote to memory of 628 1648 c03071a592d56cf15bb1187cc314be6dad4fb76d3bcffd00a6c256efd38b2641.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\c03071a592d56cf15bb1187cc314be6dad4fb76d3bcffd00a6c256efd38b2641.exe"C:\Users\Admin\AppData\Local\Temp\c03071a592d56cf15bb1187cc314be6dad4fb76d3bcffd00a6c256efd38b2641.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Ntv..bat" > nul 2> nul2⤵PID:628
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD54e4676525c0837d111cdb6495ce8e62e
SHA172de2899c5afe7a5887e8950c99046764370de1f
SHA2566756813560a46e857d785646c621d46b8bea172b36e58f6f1ac16517fc521676
SHA5126759d407cfa68b475db6aa88187c8300df1d282fe74e72a2de6cc8fe7b63e25419cba41c3b53dad0fb092623e0064b85e1eeeffde99967e5abfbbe89e81b4c08